|
@@ -1,78 +0,0 @@
|
|
-From 1252dc1d1f465b8ab6b36ff7252e395e66a040cf Mon Sep 17 00:00:00 2001
|
|
|
|
-From: Simon McVittie <smcv@debian.org>
|
|
|
|
-Date: Fri, 21 Jul 2017 10:46:39 +0100
|
|
|
|
-Subject: [PATCH 1/2] config-loader-expat: Tell Expat not to defend against
|
|
|
|
- hash collisions
|
|
|
|
-
|
|
|
|
-By default, Expat uses cryptographic-quality random numbers as a salt for
|
|
|
|
-its hash algorithm, and since 2.2.1 it gets them from the getrandom
|
|
|
|
-syscall on Linux. That syscall refuses to return any entropy until the
|
|
|
|
-kernel's CSPRNG (random pool) has been initialized. Unfortunately, this
|
|
|
|
-can take as long as 40 seconds on embedded devices with few entropy
|
|
|
|
-sources, which is too long: if the system dbus-daemon blocks for that
|
|
|
|
-length of time, important D-Bus clients like systemd and systemd-logind
|
|
|
|
-time out and fail to connect to it.
|
|
|
|
-
|
|
|
|
-We're parsing small configuration files here, and we trust them
|
|
|
|
-completely, so we don't need to defend against hash collisions: nobody
|
|
|
|
-is going to be crafting them to cause pathological performance.
|
|
|
|
-
|
|
|
|
-Bug: https://bugs.freedesktop.org/show_bug.cgi?id=101858
|
|
|
|
-Signed-off-by: Simon McVittie <smcv@debian.org>
|
|
|
|
-Tested-by: Christopher Hewitt <hewitt@ieee.org>
|
|
|
|
-Reviewed-by: Philip Withnall <withnall@endlessm.com>
|
|
|
|
-
|
|
|
|
-Upstream commit 1252dc1d1f465b8ab6b36ff7252e395e66a040cf
|
|
|
|
-Signed-off-by: Marcus Hoffmann <m.hoffmann@cartelsol.com>
|
|
|
|
----
|
|
|
|
- bus/config-loader-expat.c | 14 ++++++++++++++
|
|
|
|
- configure.ac | 8 ++++++++
|
|
|
|
- 2 files changed, 22 insertions(+)
|
|
|
|
-
|
|
|
|
-diff --git a/bus/config-loader-expat.c b/bus/config-loader-expat.c
|
|
|
|
-index b571fda3..27cbe2d0 100644
|
|
|
|
---- a/bus/config-loader-expat.c
|
|
|
|
-+++ b/bus/config-loader-expat.c
|
|
|
|
-@@ -203,6 +203,20 @@ bus_config_load (const DBusString *file,
|
|
|
|
- goto failed;
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
-+ /* We do not need protection against hash collisions (CVE-2012-0876)
|
|
|
|
-+ * because we are only parsing trusted XML; and if we let Expat block
|
|
|
|
-+ * waiting for the CSPRNG to be initialized, as it does by default to
|
|
|
|
-+ * defeat CVE-2012-0876, it can cause timeouts during early boot on
|
|
|
|
-+ * entropy-starved embedded devices.
|
|
|
|
-+ *
|
|
|
|
-+ * TODO: When Expat gets a more explicit API for this than
|
|
|
|
-+ * XML_SetHashSalt, check for that too, and use it preferentially.
|
|
|
|
-+ * https://github.com/libexpat/libexpat/issues/91 */
|
|
|
|
-+#if defined(HAVE_XML_SETHASHSALT)
|
|
|
|
-+ /* Any nonzero number will do. https://xkcd.com/221/ */
|
|
|
|
-+ XML_SetHashSalt (expat, 4);
|
|
|
|
-+#endif
|
|
|
|
-+
|
|
|
|
- if (!_dbus_string_get_dirname (file, &dirname))
|
|
|
|
- {
|
|
|
|
- dbus_set_error (error, DBUS_ERROR_NO_MEMORY, NULL);
|
|
|
|
-diff --git a/configure.ac b/configure.ac
|
|
|
|
-index 52da11fb..c4022ed7 100644
|
|
|
|
---- a/configure.ac
|
|
|
|
-+++ b/configure.ac
|
|
|
|
-@@ -938,6 +938,14 @@ XML_CFLAGS=
|
|
|
|
- AC_SUBST([XML_CFLAGS])
|
|
|
|
- AC_SUBST([XML_LIBS])
|
|
|
|
-
|
|
|
|
-+save_cflags="$CFLAGS"
|
|
|
|
-+save_libs="$LIBS"
|
|
|
|
-+CFLAGS="$CFLAGS $XML_CFLAGS"
|
|
|
|
-+LIBS="$LIBS $XML_LIBS"
|
|
|
|
-+AC_CHECK_FUNCS([XML_SetHashSalt])
|
|
|
|
-+CFLAGS="$save_cflags"
|
|
|
|
-+LIBS="$save_libs"
|
|
|
|
-+
|
|
|
|
- # Thread lib detection
|
|
|
|
- AC_ARG_VAR([THREAD_LIBS])
|
|
|
|
- save_libs="$LIBS"
|
|
|
|
---
|
|
|
|
-2.11.0
|
|
|
|
-
|
|
|